1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
5

Technical term of stealing personal information in social media.​

Computers and Technology
1 answer:
iVinArrow [24]3 years ago
7 0

Answer:

stalking/identity fraud

You might be interested in
Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a loop to con
ch4aika [34]

Answer:

The search bars in search engines to find the most reliable information.  

Explanation:

8 0
3 years ago
A circuit has a resistance of 300 ohm and a current of 0.024 A. What is the voltage in the circuit?
fomenos
**Formula

If u want to calculate voltage:
Current x Resistance

so the answer is D

Current:
Voltage ÷ Resistance

Resistance:
Voltage ÷ Current
7 0
3 years ago
Can i eat chicken and you shut
scoray [572]

Answer:

ofcccc whenn ?

3 0
3 years ago
Read 2 more answers
What does VERONIcA stand for?
kompoz [17]
Very Easy Rodent-Oriented Netwide Index to Computerized Archives
5 0
4 years ago
Read 2 more answers
What does a controller control?
ruslelena [56]

Answer:

b. the interface between the hard disk and the system bus

Explanation:

A controller, in the most basic computing terms, is a hardware chip or card that falls between two hardware components. Thus, a computer’s motherboard will always have a controller that interfaces with RAM, hard disk, DVD drives or other hardware components. Being an interface between two hardware devices facilitate incoming and outgoing commutations. Option B therefore, is the correct answer because it interfaces between the hard disk and sytem bus, which are both hardware components.

8 0
3 years ago
Other questions:
  • Distingush between Microkernels andexokernels
    9·1 answer
  • The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
    13·1 answer
  • Under what circumstances would it be appropriate to use the sentence method of note taking, and what are the advantages and disa
    7·2 answers
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • 7-eleven had to file for a bankruptcy. However they become a profit making company after installing an Information System that a
    12·1 answer
  • Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked?
    14·1 answer
  • If a 120 V appliance requires 15 A to operate, what is the resistance of the appliance?
    10·1 answer
  • Write a program that reads a stream of integers from a file and writes only the positive numbers to a second file. The user shou
    5·1 answer
  • What is unique about the TODAY and NOW functions?
    15·2 answers
  • Which tab allows you to review the slideshow timings?<br> O Home<br> O View<br> O Review<br> O File
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!